1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Natalija [7]
3 years ago
14

Why is the ROUND function used in Excel? Group of answer choices to ensure that the values generated are always positive to ensu

re that the values generated are whole numbers to ensure that the values generated are multiples of ten to ensure that the values are even numbers
Computers and Technology
2 answers:
Vesna [10]3 years ago
8 0

Answer:

To roundup digits to a number of decimal places.

Explanation:

Microsoft Excel is a spreadsheet application tool in Microsoft office packages used to analyze and organize data. There are several formulas and functions used in excel.

The Round function is an example of excel math function used to evaluate numbers to a specified number of decimal places. It can be used as just function on a cell or as a part of a formula. It's syntax is;

Round(number, digit)

777dan777 [17]3 years ago
7 0

Answer:

The Microsoft Excel ROUND function returns a number rounded to a specified number of digits.

The ROUND function is a built-in function in Excel that is categorized as a Math/Trig Function. It can be used as a worksheet function (WS) in Excel. As a worksheet function, the ROUND function can be entered as part of a formula in a cell of a worksheet.

The syntax for the ROUND function in Microsoft Excel is:

ROUND( number, digits )

You might be interested in
Given the following word addresses: 3, 180, 43, 2,191, 88, 190, 14, 181, 44, 186, 253
professor190 [17]

Answer:

A. index bits = 2, tag bits = 2, block offset bits = 1, it is a miss.

B. index bits = 2, tag bits = 1, block offset bits = 0, it is a hit

C. the miss rate is 0

Explanation:

a. number of blocks = 12

number of blocks per set = 3

number of set = number of blocks / number of blocks per set = 12/3 = 4

word size = 24

block size = 2

the block offset = log_{2} block size

   = log_{2} 2 = 1

the index bits = log_{2} number of set = log_{2} 4 = 2

the tag bits = (log_{2} word size) - offset - index = (log_{2} 24) -2 - 1 = 5 -2 - 1 = 2

b. word size = 8

block size = 1

the block offset = log_{2} block size

   = log_{2} 1 = 0

the index bits = log_{2} number of set = log_{2} 4 = 2

the tag bits = (log_{2} word size) - offset - index = (log_{2} 8) -2 - 1 = 3 - 0- 2= 1

7 0
3 years ago
Computers are often referred to as _____.
GalinKa [24]
Smart machines I'm pretty sure
4 0
3 years ago
Convert to binary140
marshall27 [118]

00110001 00110100 00110000

5 0
3 years ago
To move or copy a range of cells, select the correct order:
Karo-lina-s [1.5K]

Answer:

Correct Order

2. Select the cell or range you want to move or copy.

1. Move the pointer over the border of the selection until the pointer changes shape.

3. To move the range, click the border and drag the selection to a new location, or to copy the range, hold down the Ctrl key and drag the selection to a new location.

Explanation:

To move or copy range of cells in MS Excel, You first select the cell/range you want to move or copy, hover the mouse pointer and take note when it changes shape, then finally click the border (when you noticed the change of shape of the pointer) and hold down the ctrl key and drag it to the destination location.

6 0
3 years ago
The virus scanning technique that uses rules to determine if a program behaves like a virus is _________ scanning.
andrew-mc [135]

Answer:

Option c: Heuristic

Explanation:

Heuristic scanning is a form of computer virus detection analysis that screen for the suspicious characteristic of the program which maybe a virus. Heuristic scanning is designed to detect those new computer virus, unknown virus or the modified version of the known virus.

To perform heuristic scanning, a weigh-based evaluation algorithm will be adopted to estimate the likelihood of the current scanned program behaves like a virus which can pose a computer threat. If it exceeds a threshold level, an alarm will be triggered.

3 0
3 years ago
Other questions:
  • Which presenter would most likely benefit from a custom slide show?
    15·1 answer
  • In which file format is image data compiled into a binary file? TIFF SVG CGM BMP
    11·1 answer
  • 3. What is the purpose of the conclusion in an expository essay? (1 point)
    8·2 answers
  • What are the three parts of a Function
    12·1 answer
  • In java, a class that is defined without an explicit extends clause ____.
    15·2 answers
  • PLEASE HELP! 2D Animation!
    12·1 answer
  • Caroline’s personal laptop was attacked by malware. When she got it fixed from the service center, the computer technician advis
    10·1 answer
  • What is the point of brainy when other people have to answer your questions but not the cumputer
    9·1 answer
  • Write a function that accepts a pointer to a C-string as an argument and returns the number of words contained in the string. Fo
    13·1 answer
  • Define horizontal scroll bar​
    6·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!